Hello,

About 2 weeks ago, I followed a topic called "ntlm_auth diffculty".
My target is to authenticate Windows XP/SP1 users via peap_chapv2 
against a Windows 2003 AD. But I didn’t make it after all.

The ntlm_auth statment was executed but got a failure login result 
all the time. It also caused my id locked out.
I can successfully authenticate with the command with my password as 
below:
 ./ntlm_auth --username=<loginid> --domain=<domain> 

It end up with a message like this:
[2004/12/13 14:45:50,10] intl/lang_tdb.c:lang_tdb_init(135)
   lang_tdb_init: /usr/lib/samba/en_US.UTF-8.msg:No such file or directory
NT_STATUS_OK: Success  (0x0)

But when I try to copy the ntlm_auth  from the radiusd –X output and past 
them into the CLI, the authentication would be failed with a message:
Logon failure (0xc000006d). (challenge/response)

If I use:
wbinfo -a  username%password
both plain-text and challenge/response is wokring.
After reading the entire log, I see
"  rlm_mschap: No User-Password configured.  Cannot create LM-
Password."
"  rlm_mschap: No User-Password configured.  Cannot create NT-Password.
"
Does that mean the password from supplicant is not received by freeradius ?
If it's the case,how could radiusd do the challenge/response without user's 
password ? 

It’s a Fedora Core 2 box, samba 3.0.9 linux box and a Cisco AP1200 
access point.
I know it seems like a winbind problem, but I didn't find further
Information neither here nor samba mailing list.
Could someone who have similar experiences give me a hint or 
a right direction ?   Any suggestions would be really appreciated.
Following is my radiusd starup log and an authenticating request log:

[root@<hostname> root]# /usr/local/freeradius/sbin/radiusd -X
Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /etc/raddb/proxy.conf
Config:   including file: /etc/raddb/clients.conf
Config:   including file: /etc/raddb/snmp.conf
Config:   including file: /etc/raddb/eap.conf
 main: prefix = "/usr/local/freeradius"
 main: localstatedir = "/var"
 main: logdir = "/var/log/radius"
 main: libdir = "/usr/local/freeradius/lib"
 main: radacctdir = "/var/log/radius/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = yes
 main: log_file = "/var/log/radius/radius.log"
 main: log_destination = "files"
 main: log_auth = no
 main: log_auth_badpass = yes
 main: log_auth_goodpass = yes
 main: pidfile = "/var/run/radiusd/radiusd.pid"
 main: user = "(null)"
 main: group = "(null)"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/local/freeradius/sbin/checkrad"
 main: debug_level = 0
 main: proxy_requests = yes
 log: syslog_facility = "daemon"
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = yes
 proxy: wake_all_if_all_dead = no
 proxy: proxy_fail_type = "(null)"
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/local/freeradius/lib
Module: Loaded exec
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded Expiration
 expiration: reply-message = "Password Has Expired  "
Module: Instantiated expiration (expiration)
Module: Loaded logintime
 logintime: reply-message = "You are calling outside your allowed timespan  "
 logintime: minimum-timeout = 60
Module: Instantiated logintime (logintime)
Module: Loaded MS-CHAP
 mschap: use_mppe = no
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: with_ntdomain_hack = no
 mschap: passwd = "(null)"
 mschap: authtype = "MS-CHAP"
 mschap: ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%
{mschap:User-Name} --domain=%{mschap:NT-Domain} --challenge=%
{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
Module: Instantiated mschap (mschap)
Module: Loaded eap
 eap: default_eap_type = "peap"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = yes
 eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
 tls: certificate_file = "/etc/raddb/certs/cert-srv.pem"
 tls: CA_file = "/etc/raddb/certs/demoCA/cacert.pem"
 tls: private_key_password = "nothing"
 tls: dh_file = "/etc/raddb/certs/dh"
 tls: random_file = "/etc/raddb/certs/random"
 tls: fragment_size = 1600
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
rlm_eap: Loaded and initialized type tls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = yes
 peap: use_tunneled_reply = yes
 peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
 preprocess: huntgroups = "/etc/raddb/huntgroups"
 preprocess: hints = "/etc/raddb/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
 realm: format = "prefix"
 realm: delimiter = "\"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (ntdomain)
Module: Loaded detail
 detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-
%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (auth_log)
 realm: format = "suffix"
 realm: delimiter = "@"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded files
 files: usersfile = "/etc/raddb/users"
 files: acctusersfile = "/etc/raddb/acct_users"
 files: preproxy_usersfile = "/etc/raddb/preproxy_users"
 files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-
IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
 detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%
m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded System
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "(null)"
 unix: group = "(null)"
 unix: radwtmp = "/var/log/radius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded radutmp
 radutmp: filename = "/var/log/radius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
 detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/post-proxy-
detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (post_proxy_log)
Initializing the thread pool...
Listening on authentication *:1812
Listening on accounting *:1813
Listening on proxy *:1814
Ready to process requests.
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=245, 
length=154
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x8e00272827d0d29cb54093dd66630ab8
        EAP-Message = 0x0202001301434f4445315c5457473030383335
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  rlm_eap: EAP packet type response id 2 length 19
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 0
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 0
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 0
  modcall[authorize]: module "expiration" returns noop for request 0
  modcall[authorize]: module "logintime" returns noop for request 0
modcall: group authorize returns updated for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 245 to 130.147.167.9:21657
        EAP-Message = 0x010300061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd87b2babb6e37e5f3b396fe91e90e55c
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=246, 
length=233
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0xdfdea22887b0bb74589955a88e35def3
        EAP-Message = 
0x0203005019800000004616030100410100003d030141bcf4c26c63810
a7e753760f3d72a0dbf000d0b21fbef9970faba47319a31e5000016000400
05000a000900640062000300060013001200630100
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        State = 0xd87b2babb6e37e5f3b396fe91e90e55c
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  rlm_eap: EAP packet type response id 3 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 1
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 1
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 1
  modcall[authorize]: module "expiration" returns noop for request 1
  modcall[authorize]: module "logintime" returns noop for request 1
modcall: group authorize returns updated for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0694], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    TLS_accept: SSLv3 write server done A
    TLS_accept: SSLv3 flush data
    TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 246 to 130.147.167.9:21657
        EAP-Message = 
0x0104057e19c0000006f1160301004a02000046030141bcf4c52fa951252
bebcc27ccd96cdfa3f50dc8b46aa761a881ccaa2ea7c4b420061644f37876
bd15ecd42db01034a2f2c557b2f1a63037efd094be27e7ee5f7d000400160
30106940b00069000068d0002cd308202c930820232a003020102020102
300d06092a864886f70d010104050030819f310b3009060355040613024
3413111300f0603550408130850726f76696e6365311230100603550407
1309536f6d65204369747931153013060355040a130c4f7267616e697a61
74696f6e31123010060355040b13096c6f63616c686f7374311b30190603
5504031312436c69656e74206365
        EAP-Message = 
0x7274696669636174653121301f06092a864886f70d0109011612636c69
656e74406578616d706c652e636f6d301e170d303430313235313332363
1305a170d3035303132343133323631305a30819b310b3009060355040
6130243413111300f0603550408130850726f76696e6365311230100603
5504071309536f6d65204369747931153013060355040a130c4f7267616e
697a6174696f6e31123010060355040b13096c6f63616c686f7374311930
1706035504031310526f6f74206365727469666963617465311f301d0609
2a864886f70d0109011610726f6f74406578616d706c652e636f6d30819f3
00d06092a864886f70d010101050003
        EAP-Message = 
0x818d0030818902818100dac525422bfedb082629a2cba44b3449c90d0
ab462fb72c8434a782098863d7eb7d7e70028c2b7ad555a51cc756cf4fa1d
7091615ab450d5289553ae6616aff014a55085d6b8fb4aee98638e426175
cdd36c665c63cda177d34920eb30585edc8773999c2980f81ad4638bbbea
1c82d054023db7ef24a3ec1c3f6241a903d7f30203010001a31730153013
0603551d25040c300a06082b06010505070301300d06092a864886f70d0
101040500038181007a2d921b1cf13bf2982a9178ec9ede6d88edc178a2e
8bd40a0a06fb6f0769957884cd7084537083496fd184165293f583c8e8240
eb68e042c94b15752e4c07e80d09
        EAP-Message = 
0x779afa3dd55c24fa54ac292d77205d1c2477ed30d59f57caf9bd21ff2a8d
16cc0911c50e4f295763fcb60efa3c3d2d0e43850f6e6fbe284902f6e83503
650003ba308203b63082031fa003020102020100300d06092a864886f70
d010104050030819f310b30090603550406130243413111300f06035504
08130850726f76696e63653112301006035504071309536f6d652043697
47931153013060355040a130c4f7267616e697a6174696f6e31123010060
355040b13096c6f63616c686f7374311b301906035504031312436c69656
e742063657274696669636174653121301f06092a864886f70d01090116
12636c69656e74406578616d706c
        EAP-Message = 
0x652e636f6d301e170d3034303132353133323630375a170d303630313
2343133323630375a30819f310b30090603550406130243413111300f06
03550408130850726f76696e63653112301006035504071309536f6d652
04369747931153013060355040a130c4f7267616e697a6174696f6e31123
010060355040b13096c6f63616c686f7374311b301906035504031312436
c69656e742063657274696669636174653121301f06092a864886f70d010
9011612636c69656e74406578616d706c652e636f6d30819f300d06092a8
64886f70d010101050003818d0030818902818100d4c5b19724f164acf1ff
b189db1c8fbff4f14396ea7cb1e90f
        EAP-Message = 
0x78d69451725377895dfe52ccb99b41e80ddeb58b127a943f4f58cbc5628
78192fbdc6fece9f871e7c130d35cf5188817e9b133249edd2a1c75d31043
ae87553cec7a77ef26aa7d74281db9b77e17c6446c5dd9b188b43250ca0
229963722a123a726b00b4027fd0203010001a381ff3081fc301d0603551d
0e0416041468d36d3e1ee7bc9d5a057021c363da13
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x538d1e19347e929d0d4a51166c46bd6f
Finished request 1
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=247, 
length=159
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x1538c411a42f7f3cfa7496926ffef795
        EAP-Message = 0x020400061900
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        State = 0x538d1e19347e929d0d4a51166c46bd6f
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 2
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 2
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 2
  modcall[authorize]: module "expiration" returns noop for request 2
  modcall[authorize]: module "logintime" returns noop for request 2
modcall: group authorize returns updated for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 247 to 130.147.167.9:21657
        EAP-Message = 
0x01050183190065d1ade33081cc0603551d230481c43081c1801468d36
d3e1ee7bc9d5a057021c363da1365d1ade3a181a5a481a230819f310b30
090603550406130243413111300f0603550408130850726f76696e63653
112301006035504071309536f6d65204369747931153013060355040a13
0c4f7267616e697a6174696f6e31123010060355040b13096c6f63616c68
6f7374311b301906035504031312436c69656e742063657274696669636
174653121301f06092a864886f70d0109011612636c69656e74406578616
d706c652e636f6d820100300c0603551d13040530030101ff300d06092a8
64886f70d01010405000381810033c00b
        EAP-Message = 
0x66b1e579ef73a06798252dab8d5e5511fc00fd276d80d12f834777c6743f
dc2743fca1507704e4bc0979e4f60ac3ad9ee83e6f347369229d1f77229ba
2e982359da563024a00163dba6d6c986c0bad28af85132ff8f0d76501bf1b
7c2dff658ce1e62c01997b6e64e3e8d4373354ce9912847651539063b85b
bc5485c516030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x0c3ad0facd8caa2de6a611057bf53d4f
Finished request 2
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=248, 
length=345
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x7c349b4ef074d9a61b0ec9697a912777
        EAP-Message = 
0x020500c01980000000b61603010086100000820080426e0ca51a74fa0
459a8f7a5d7def363cb90abff5e85fca36ba3b45a33809d16e0615edb0dc8
a7667a9e6f6f3dd17f0f168c91577ef172e65b52e410a5c164a6fe6c7bafffd5
a7bcd14ea8836b49c6e70697c78c3f826551f62991002a97ce2cfd8e91ee2
425e1f7647414f89d4ec1bdf0fc2fc09c10adcb628c3b165fd01e8f14030100
0101160301002001502e78a3e594f853f9b608b7a8aea8a97329026ed83
d2a84136ff8e64c787d
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        State = 0x0c3ad0facd8caa2de6a611057bf53d4f
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  rlm_eap: EAP packet type response id 5 length 192
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 3
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 3
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 3
  modcall[authorize]: module "expiration" returns noop for request 3
  modcall[authorize]: module "logintime" returns noop for request 3
modcall: group authorize returns updated for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
SSL Connection Established
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 248 to 130.147.167.9:21657
        EAP-Message = 
0x010600311900140301000101160301002012aa7b5ec813a6e69040c6e
61f5fae54dd02f01b83f3d82daaa2798a7ad6cb88
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x226119a0b7022eb56eb484c1fdd16f3c
Finished request 3
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=249, 
length=159
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x00bdc65137873296d224ffa5b408ad32
        EAP-Message = 0x020600061900
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        State = 0x226119a0b7022eb56eb484c1fdd16f3c
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  rlm_eap: EAP packet type response id 6 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 4
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 4
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 4
  modcall[authorize]: module "expiration" returns noop for request 4
  modcall[authorize]: module "logintime" returns noop for request 4
modcall: group authorize returns updated for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3
  eaptls_process returned 3
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 249 to 130.147.167.9:21657
        EAP-Message = 
0x0107002019001703010015bf073fd7dca5f2ff230aecd9354888b6bd19e0
cc78
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc44881a35d3dc6121fcaad8bc9a82d9b
Finished request 4
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=250, 
length=195
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0xb0b2f195ce17edfea222113c7fc0ac44
        EAP-Message = 
0x0207002a1900170301001fa0b53041ff51b87dada34c5fe8d94ecd598f4b
8a81351c9f842db210cff71c
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        State = 0xc44881a35d3dc6121fcaad8bc9a82d9b
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  rlm_eap: EAP packet type response id 7 length 42
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 5
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 5
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 5
  modcall[authorize]: module "expiration" returns noop for request 5
  modcall[authorize]: module "logintime" returns noop for request 5
modcall: group authorize returns updated for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - <domain>\<username>
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
        EAP-Message = 0x0207001301434f4445315c5457473030383335
  PEAP: Got tunneled identity of <domain>\<username>
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to <domain>\<username>
  PEAP: Sending tunneled request
        EAP-Message = 0x0207001301434f4445315c5457473030383335
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  rlm_eap: EAP packet type response id 7 length 19
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 5
radius_xlat:  '/var/log/radius/radacct/127.0.0.1/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/127.0.0.1/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 5
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 5
  modcall[authorize]: module "expiration" returns noop for request 5
  modcall[authorize]: module "logintime" returns noop for request 5
modcall: group authorize returns updated for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
  PEAP: Got tunneled reply RADIUS code 11
        EAP-Message = 
0x010800281a0108002310a8a3eb70b186443c95ac951b5af5f64a434f44
45315c5457473030383335
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd957309280621ac9353b9520ed51edd6
  PEAP: Processing from tunneled session code 0x836fbc0 11
        EAP-Message = 
0x010800281a0108002310a8a3eb70b186443c95ac951b5af5f64a434f44
45315c5457473030383335
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd957309280621ac9353b9520ed51edd6
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 250 to 130.147.167.9:21657
        EAP-Message = 
0x0108003f19001703010034ef4f4022d4f7aab05a5a7c4df475cd8adaa31e
1c882a311a25355beac9179bad6f0ede5e90a22b0f68407b89da6122e1cc
4e781f
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xea5228d360c56a389fd9230caf5cf4a9
Finished request 5
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=251, 
length=249
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0xd955e436e56389ecb66b41daf648f7dd
        EAP-Message = 
0x0208006019001703010055dfa0f65103058589b8201cde143475072433
9b02c78810caa88a5684bb5383567522ad52d1989abc6ec5cc427dc00bd
8a3ad47026985fa89ab427e018db6f5f87f10d178716f786ea5d5b3837190
739d054b89a351
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        State = 0xea5228d360c56a389fd9230caf5cf4a9
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  rlm_eap: EAP packet type response id 8 length 96
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 6
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 6
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 6
  modcall[authorize]: module "expiration" returns noop for request 6
  modcall[authorize]: module "logintime" returns noop for request 6
modcall: group authorize returns updated for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
        EAP-Message = 
0x020800491a020800443144b398c68e4dced5bbe4a9f1bb2fe9e8000000
000000000095e3ebaffe75a71aef536b385da5a98e3890e9ab8c88793000
434f4445315c5457473030383335
  PEAP: Setting User-Name to <domain>\<username>
  PEAP: Adding old state with d9 57
  PEAP: Sending tunneled request
        EAP-Message = 
0x020800491a020800443144b398c68e4dced5bbe4a9f1bb2fe9e8000000
000000000095e3ebaffe75a71aef536b385da5a98e3890e9ab8c88793000
434f4445315c5457473030383335
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "<domain>\\<username>"
        State = 0xd957309280621ac9353b9520ed51edd6
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  rlm_eap: EAP packet type response id 8 length 73
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 6
radius_xlat:  '/var/log/radius/radacct/127.0.0.1/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/127.0.0.1/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 6
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 6
  modcall[authorize]: module "expiration" returns noop for request 6
  modcall[authorize]: module "logintime" returns noop for request 6
modcall: group authorize returns updated for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group Auth-Type for request 6
  rlm_mschap: No User-Password configured.  Cannot create LM-Password.
  rlm_mschap: No User-Password configured.  Cannot create NT-Password.
  rlm_mschap: NT Domain delimeter found, should we have enabled 
with_ntdomain_hack?
  rlm_mschap: Told to do MS-CHAPv2 for <domain>\<username> with NT-
Password
radius_xlat: Running registered xlat function of module mschap for string 
'User-Name'
radius_xlat:  '--username=<username>'
radius_xlat: Running registered xlat function of module mschap for string 'NT-
Domain'
radius_xlat:  '--domain=<domain>'
radius_xlat: Running registered xlat function of module mschap for string 
'Challenge'
 mschap2: a8
  rlm_mschap: NT Domain delimeter found, should we have enabled 
with_ntdomain_hack?
radius_xlat:  '--challenge=82ebdc501968c506'
radius_xlat: Running registered xlat function of module mschap for string 'NT-
Response'
radius_xlat:  '--nt-
response=95e3ebaffe75a71aef536b385da5a98e3890e9ab8c887930'
Exec-Program output: Logon failure (0xc000006d)
Exec-Program-Wait: plaintext: Logon failure (0xc000006d)
Exec-Program: Abnormal child exit: No child processes
  rlm_mschap: External script failed.
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 6
modcall: group Auth-Type returns reject for request 6
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 6
modcall: group authenticate returns reject for request 6
auth: Failed to validate the user.
  PEAP: Got tunneled reply RADIUS code 3
        MS-CHAP-Error = "\010E=691 R=1"
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Processing from tunneled session code 0x834b3a8 3
        MS-CHAP-Error = "\010E=691 R=1"
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 251 to 130.147.167.9:21657
        EAP-Message = 
0x010900261900170301001b925347e2fef856b182bf1be73f58bb2e328d6
ef0c5c988387e1838
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x6173383da44393a6ea306af75d5849b4
Finished request 6
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=252, 
length=191
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0xcd63118ef6c63797ca70f0a998372997
        EAP-Message = 
0x020900261900170301001b360d2221330f8981a6e63a6aea905ac6a2e
21c308591e5fe257b0b
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1354
        State = 0x6173383da44393a6ea306af75d5849b4
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  rlm_eap: EAP packet type response id 9 length 38
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 7
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 7
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 7
  modcall[authorize]: module "expiration" returns noop for request 7
  modcall[authorize]: module "logintime" returns noop for request 7
modcall: group authorize returns updated for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected earlier in 
this session.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 7
modcall: group authenticate returns invalid for request 7
auth: Failed to validate the user.
Delaying request 7 for 1 seconds
Finished request 7
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 252 to 130.147.167.9:21657
        EAP-Message = 0x04090004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 245 with timestamp 41bcf4c4
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 1 ID 246 with timestamp 41bcf4c5
Cleaning up request 2 ID 247 with timestamp 41bcf4c5
Cleaning up request 3 ID 248 with timestamp 41bcf4c5
Cleaning up request 4 ID 249 with timestamp 41bcf4c5
Cleaning up request 5 ID 250 with timestamp 41bcf4c5
Cleaning up request 6 ID 251 with timestamp 41bcf4c5
Waking up in 2 seconds...
--- Walking the entire request list ---
Cleaning up request 7 ID 252 with timestamp 41bcf4c7
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 130.147.167.9:21657, id=253, 
length=154
        User-Name = "<domain>\\<username>"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0xf5f0d5df18903e3e280c18beaf9c2a48
        EAP-Message = 0x0201001301434f4445315c5457473030383335
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1355
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  rlm_eap: EAP packet type response id 1 length 19
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    rlm_realm: Looking up realm "<domain>" for User-Name = 
"<domain>\<username>"
    rlm_realm: Found realm "<domain>"
    rlm_realm: Adding Stripped-User-Name = "<username>"
    rlm_realm: Proxying request from user <username> to realm <domain>
    rlm_realm: Adding Realm = "<domain>"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 8
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041213'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%
d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-20041213
  modcall[authorize]: module "auth_log" returns ok for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop for request 8
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 8
  modcall[authorize]: module "expiration" returns noop for request 8
  modcall[authorize]: module "logintime" returns noop for request 8
modcall: group authorize returns updated for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 8
modcall: group authenticate returns handled for request 8
Sending Access-Challenge of id 253 to 130.147.167.9:21657
        EAP-Message = 0x010200061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc3fbfb395612ce74f67c72dda6fa107f
Finished request 8
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 8 ID 253 with timestamp 41bcf4cf
Nothing to do.  Sleeping until we see a request.


Thank you for your reading.
Chris Huang

-------------------------------------------------
This mail sent through Seednet Webmail
http://webmail.seed.net.tw

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to